Dark Reading has an interesting article about how Target was compliant with PCI(Payment Card Industry) standards and it was not enough.
The Point of Sale terminals were infected with malware specific to Point Of Sale terminals, stole the CC# and the 3 digit CV code as well. So it was designed to steal the complete magnetic strip information.
Many parties may be to blame in this, but what can you do in the meantime?
Test your systems - check for malware, in an automated manner. If there are unknown pieces of software or ports open on your computers then that means it requires more investigations and cleaning the systems.
Use our Alpha-A, Sigma-Σ, and Omega-Ω services. (A – Σ – Ω)
On today's Internet Storm Center Diary :
Johannes noticed an odd attack coming from what turned out to be a DVR in China.
This is a shape of things to come, unattended devices, which never get patched will be attacked and then used to attack your infrastructure.
This is why it behooves you to work hard to remove all the vulnerabilities one can.
Use our minimal Alpha Scan which allows a minimal scan and review, it is as unintrusive as viewing a webpage without any scripting.
It is important to patch all your Internet facing devices. Becasue if you don't eventually someone will use your Internet bandwidth and computing resources for their own uses.
Unfortunately in this day, it is not enough to have a person on staff to handle your IT work, or even be in charge of Security tasks.
How can you be certain that tasks are being done to a level of proficiency that is required?
A second person needs to review and test. that is where Fixvirus,com come in.
That is why we created www.oversightsentry.com to attempt to make this security process easier.
Security design, quality control and testing need to be incorporated in all facets of business, especially the outward facing computers and applications on the Internet.
Violent Python is a book by TJ. O’Connor.
It is interesting how Python can use nmap and other opensource tools (metasploit) to probe and review computer systems.
When trying to login to WordPress
I got this message instead:
(output started at public_html/wp-content/plugins/twitter/widget_twitter_vjck.php:171) in public_html/wp-includes/pluggable.php on line 896)
Which is interesting to say the least.
So after searching the Internet for a similar problem I found this WordPress support page:
Which suggested to look at the error and look for missing ?> (in this case they wanted the person to delete all content and add the ending bookends for the php code.
So I went to public_html/wp-includes/pluggable.php and found out that it did not have ?> for some reason. So I added the bookend at end of file "?>" and now I can login again.
I remember a couple of days ago I was trying to install a plugin and had some trouble. I eventually did get it installed, but I tried with several logins and different browsers. These actions may have caused WordPress to perform a file edit.
Anyway it is always good to have a backup, but if you need some WordPress help let us know.
It is a good idea to get in the habit of patching your systems consistently.
Not wanting to reboot is sometimes a wish of all of us, as we do not want to close all of our windows down, and restart fresh.
But we have to get in the habit, at least once a week to reboot and patch if needed.
this week teh patch Tuesday fixes as Threatpost mentions the 17 vulnerabilities fixed in Internet Explorer, as well as a Zero-Day vulnerability.
Zero-day vulnerabilities are a problem since there is no fix for a while, so a malicious attack cannot be thwarted.
As an ethical hacker it is much harder to attack a system successfully with all the current patches on the system.
On patch Tuesday Microsoft has decided to roll up all the vulnerabilities found in the last month on one day, otherwise as each vulnerability gets created and fixed there would be many of them spaced out in a month and it thus becomes unmanageable in an enterprise environment(at more than 1000's of computers). On March 2014 nakedsecurity says there are 5 bulletins, with 2 critical, and even Mac)
So with patch Tuesday at Microsoft the other vendors with vulnerabilities have also instituted a release time in the month of their patches, causing the date of the month: "2nd Tuesday" a prominence in the calendar. IT departments everywhere are working around the new vulnerability patch releases and their resulting fixes.
We at Fixvirus.com are frequently tasked to ensure patches have been installed and do provide security capabilities by using our
Alpha(A), Sigma(Σ), and Omega(Ω) scans.
Assessing Website structures, network infrastructure, and overall reviews of technology (wifi and anything computer related).
The key with staying secure on the Internet is: Update your software, keep systems up-to-date, close software and ports that are not needed.
Be vigilant perform unique tests on your forms and SQL command structures, you will only know that your data will not be compromised when you test. Having an independent person try things to break and gt by your security is the only way to be more secure.
In the last 25 years the most common vulnerabilities are?
From VRT-Blog at snort.org
Total vulnerabilities and highly critical vulnerabilities were up in 2012 after a significant downswing over the previous few years; 2012 was a record-breaking year for the number of most critical vulnerabilities, those with a CVSS score of 10.
Buffer overflows continue to be the most important type of vulnerability, with 35% of the total share of critical vulnerabilities over the last 25 years.
Interesting to note that Microsoft also has been bumped as the top vendor (highest number of vulnerabilities)
Oracle (with Java) has replaced Microsoft.
Has a discussion of a warning about an analysis about a new toolkit that makes it easier to create malware or other attacks on the Windows platform, Java, and Adobe.
This is the actual link
AVG ThreatLabs has also discussed the Cool Exploit Kit.
What does this mean? - Be extra careful of links and attachments, as new malware is being developed.